Created on
‎12-03-2023
11:55 PM
Edited on
‎07-01-2025
08:23 PM
By
Jackie_T
Description | This article describes how to configure Server URL-list or Wildcard in FortiProxy to bypass DNS Lookup in web forwarding proxy setup. |
Scope | FortiProxy. |
Solution |
By default, in explicit proxy-chain setup, FortiProxy as child-proxy will perform DNS lookup for the intercepted client HTTP requests. Server URLs can be configured so that certain URLs (url-list) or all URLs (wildcard) bypass the DNS lookup in child-proxy.
The following example creates a URL list 'url-test-1', which will be used to bypass URLs 'example.com', 'red.com', and '*.fortinet.com' from DNS lookup in child-proxy. The URL list will be applied in the server URL setting.
config web-proxy url-list
config web-proxy url-match
WAD debug output shows that the DNS lookup does not occur when the user browses 'example.com', which matches the URL list:
dia wad debug enable category http
[I]2023-12-03 20:49:03.550655 wad_dump_http_request :2736 hreq=0x7f99448fda80 Received request from client: 10.100.4.131:64127 GET http://example.com/ HTTP/1.1 .... .... [V]2023-12-03 20:49:03.550690 wad_http_req_exec_act :13435 dst_addr_type=0 wc_nontp=1 sec_web=1 web_cache=0 req_bypass=0
The WAD debug log below shows DNS lookup occurs when the user tries to browse to 'bbc.com', which is not in the URL list.
Note: If there is only one explicit proxy policy and the policy has web-forwarding enabled, user traffic is denied if the website is not in the URL list.
Example:
[I]2023-12-03 20:49:17.823592 wad_dump_http_request :2736 hreq=0x7f99448fd0b0 Received request from client: 10.100.4.131:64127 GET http://bbc.com/ HTTP/1.1 ..... ..... [V]2023-12-03 20:49:17.823627 wad_http_req_exec_act :13435 dst_addr_type=0 wc_nontp=1 sec_web=1 web_cache=0 req_bypass=0
If it is wanted that all the URLs bypass DNS lookup in the child proxy, then configure the Server URL with wildcard type:
config web-proxy url-match
[I]2023-12-03 21:20:58.220010 wad_dump_http_request :2736 hreq=0x7fb74abf1ab8 Received request from client: 10.100.4.131:64282 GET http://example.com/ HTTP/1.1 [V]2023-12-03 21:20:58.220022 wad_http_marker_uri :1305 scheme=http
[I]2023-12-03 21:21:01.290575 wad_http_str_canonicalize :2188 enc=0 path=/ len=1 changes=0 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.